Contents

About the Authors

About the Technical Reviewer

Acknowledgments

Introduction

image Chapter 1: Getting Started

1-1. Connecting Securely to a Remote Server

Problem

Solution

How It Works

1-2. Logging on Remotely via the Command Line

Problem

Solution

How It Works

1-3. Logging off the Server

Problem

Solution

How It Works

1-4. Running a Command

Problem

Solution

How It Works

1-5. Getting Help

Problem

Solution

How It Works

1-6. Correcting Command-Line Mistakes

Problem

Solution

How It Works

1-7. Clearing the Screen

Problem

Solution

How It Works

1-8. Resetting the Screen

Problem

Solution

How It Works

image Chapter 2: Working in the Shell

2-1. Displaying the Current Shell

Problem

Solution

How It Works

2-2. Running Previously Entered Commands

Problem

Solution

How It Works

2-3. Automatically Completing Long Commands

Problem

Solution

How It Works

2-4. Viewing Environment Variables

Problem

Solution

How It Works

2-5. Automatically Setting Shell Variables

Problem

Solution

How It Works

2-6. Customizing the Command Prompt

Problem

Solution

How It Works

2-7. Creating a Command Shortcut

Problem

Solution

How It Works

2-8. Providing Input to Commands

Problem

Solution

How It Works

2-9. Redirecting Command Output

Problem

Solution

How It Works

2-10. Sending Output to Nowhere

Problem

Solution

How It Works

2-11. Displaying and Capturing Command Output

Problem

Solution

How It Works

2-12. Recording All Shell Command Output

Problem

Solution

How It Works

2-13. Changing the Login Shell

Problem

Solution

How It Works

2-14. Modifying Command Path Search

Problem

Solution

How It Works

2-15. Viewing Built-in Commands

Problem

Solution

How It Works

2-16. Setting the Backspace Key

Problem

Solution

How It Works

2-17. Typing a Long Command in Multiple Lines

Problem

Solution

How It Works

image Chapter 3: Managing Processes and Users

3-1. Listing Processes

Problem

Solution

How It Works

3-2. Terminating Processes

Problem

Solution

How It Works

3-3. Listing the Users Logged On

Problem

Solution

How It Works

3-4. Listing the Last Logon Time of a User

Problem

Solution

How It Works

3-5. Limiting the Number of User Processes

Problem

Solution

How It Works

3-6. Viewing How Long the Server Has Been Running

Problem

Solution

How It Works

3-7. Viewing How Long a Process Has Been Running

Problem

Solution

How It Works

3-8. Displaying Your Username

Problem

Solution

How It Works

3-9. Changing Your Password

Problem

Solution

How It Works

3-10. Becoming the System Privileged (root) User

Problem

Solution

How It Works

3-11. Running Commands as the root User

Problem

Solution

How It Works

3-12. Adding a Group

Problem

Solution

How It Works

3-13. Removing a Group

Problem

Solution

How It Works

3-14. Adding a User

Problem

Solution

How It Works

3-15. Removing a User

Problem

Solution

How It Works

image Chapter 4: Creating and Editing Files

4-1. Creating a File

Problem

Solution

How It Works

4-2. Maneuvering Within a File

Problem

Solution

How It Works

4-3. Copying and Pasting

Problem

Solution

How It Works

4-4. Manipulating Text

Problem

Solution

How It Works

4-5. Searching for and Replacing Text

Problem

Solution

How It Works

4-6. Inserting One File into Another

Problem

Solution

How It Works

4-7. Joining Lines

Problem

Solution

How It Works

4-8. Running Operating System Commands

Problem

Solution

How It Works

4-9. Repeating a Command

Problem

Solution

How It Works

4-10. Undoing a Command

Problem

Solution

How It Works

4-11. Displaying Line Numbers

Problem

Solution

How It Works

4-12. Automatically Configuring Settings

Problem

Solution

How It Works

4-13. Creating Shortcuts for Commands

Problem

Solution

How It Works

4-14. Setting the Shell Default Text Editor

Problem

Solution

How It Works

4-15. Setting the SQL*Plus Text Editor

Problem

Solution

How It Works

4-16. Toggling Syntax Text Color

Problem

Solution

How It Works

image Chapter 5: Managing Files and Directories

5-1. Showing the Current Working Directory

Problem

Solution

How It Works

5-2. Changing Directories

Problem

Solution

How It Works

5-3. Creating a Directory

Problem

Solution

How It Works

5-4. Viewing a List of Directories

Problem

Solution

How It Works

5-5. Removing a Directory

Problem

Solution

How It Works

5-6. Listing Files

Problem

Solution

How It Works

5-7. Creating a File Quickly

Problem

Solution

How It Works

5-8. Changing File Permissions

Problem

Solution

How It Works

5-9. Changing File Ownership and Group Membership

Problem

Solution

How It Works

5-10. Viewing the Contents of a Text File

Problem

Solution

How It Works

5-11. Viewing Nonprinting Characters in a File

Problem

Solution

How It Works

5-12. Viewing Hidden Files

Problem

Solution

How It Works

5-13. Determining File Type

Problem

Solution

How It Works

5-14. Finding Differences Between Files

Problem

Solution

How It Works

5-15. Comparing Contents of Directories

Problem

Solution

How It Works

5-16. Copying Files

Problem

Solution

How It Works

5-17. Copying Directories

Problem

Solution

How It Works

5-18. Moving Files and Directories

Problem

Solution

How It Works

5-19. Renaming a File or Directory

Problem

Solution

How It Works

5-20. Removing a File

Problem

Solution

How It Works

5-21. Removing Protected Files Without Being Prompted

Problem

Solution

How It Works

5-22. Removing Oddly Named Files

Problem

Solution

How It Works

5-23. Finding Files

Problem

Solution

How It Works

5-24. Finding Strings in Files

Problem

Solution

How It Works

5-25. Finding a Recently Modified File

Problem

Solution

How It Works

5-26. Finding and Removing Old Files

Problem

Solution

How It Works

5-27. Finding the Largest Files

Problem

Solution

How It Works

5-28. Finding a File of a Certain Size

Problem

Solution

How It Works

5-29. Sorting Files by Size

Problem

Solution

How It Works

5-30. Finding the Largest Space-Consuming Directories

Problem

Solution

How It Works

5-31. Truncating an Operating System File

Problem

Solution

How It Works

5-32. Counting Lines and Words in a File

Problem

Solution

How It Works

5-33. Creating a Second Name for a File

Problem

Solution

How It Works

5-34. Creating a Second Name for a Directory

Problem

Solution

How It Works

5-35. Viewing a Large File

Problem

Solution

How It Works

5-36. Downloading Files

Problem

Solution

How It Works

image Chapter 6: Archiving and Compressing Files

6-1. Bundling Files Using tar

Problem

Solution

How It Works

6-2. Unbundling Files Using tar

Problem

Solution

How It Works

6-3. Finding Differences in Bundled Files Using tar

Problem

Solution

How It Works

6-4. Bundling Files Using cpio

Problem

Solution

How It Works

6-5. Unbundling Files Using cpio

Problem

Solution

How It Works

6-6. Bundling Files Using zip

Problem

Solution

How It Works

6-7. Unbundling Files Using zip

Problem

Solution

How It Works

6-8. Bundling Files Using find

Problem

Solution

How It Works

6-9. Compressing and Uncompressing Files

Problem

Solution

How It Works

6-10. Validating File Contents

Problem

Solution

How It Works

image Chapter 7: Shell Scripting

7-1. Writing a Simple Shell Script

Problem

Solution

How It Works

7-2. Checking Simple Conditions

Problem

Solution

How It Works

7-3. Testing a Condition

Problem

Solution

How It Works

7-4. Checking Complex Conditions

Problem

Solution

How It Works

7-5. Repeating a Task

Problem

Solution

How It Works

7-6. Iterating Until a Condition Is Met

Problem

Solution

How It Works

7-7. Displaying a Menu of Choices

Problem

Solution

How It Works

7-8. Running Commands Based on Success/Failure of the Previous Command

Problem

Solution

How It Works

7-9. Modularizing Scripts

Problem

Solution

How It Works

7-10. Passing Parameters to Scripts

Problem

Solution

How It Works

7-11. Processing Parameters

Problem

Solution

How It Works

7-12. Running Database Commands in Scripts

Problem

Solution

How It Works

7-13. Crafting a Robust DBA Shell Script

Problem

Solution

How It Works

7-14. Running Scripts in the Background

Problem

Solution

How It Works

7-15. Monitoring the Progress of a Script

Problem

Solution

How It Works

7-16. Debugging a Script

Problem

Solution

How It Works

image Chapter 8: Analyzing Server Performance

8-1. Identifying System Bottlenecks

Problem

Solution

How It Works

8-2. Analyzing Current and Past System Performance

Problem

Solution

How It Works

8-3. Identifying CPU-Intensive Processes

Problem

Solution

How It Works

8-4. Identifying CPU Bottlenecks

Problem

Solution

How It Works

8-5. Identifying Memory-Intensive Processes

Problem

Solution

How It Works

8-6. Identifying Memory Bottlenecks

Problem

Solution

How It Works

8-7. Identifying I/O-Intensive Processes

Problem

Solution

How It Works

8-8. Identifying I/O Bottlenecks

Problem

Solution

How It Works

8-9. Monitoring Network Traffic

Problem

Solution

How It Works

8-10. Troubleshooting Database Connectivity

Problem

Solution

How It Works

8-11. Tracing a Process

Problem

Solution

How It Works

8-12. Listing Files Opened by Processes

Problem

Solution

How It Works

image Chapter 9: Viewing and Configuring System Resources

9-1. Displaying Server Hardware and the Operating System

Problem

Solution

How It Works

9-2. Listing CPUs

Problem

Solution

How It Works

9-3. Displaying Physical Memory

Problem

Solution

How It Works

9-4. Viewing Kernel Parameters

Problem

Solution

How It Works

9-5. Modifying Kernel Parameters

Problem

Solution

How It Works

9-6. Displaying Semaphores

Problem

Solution

How It Works

9-7. Configuring Semaphores

Problem

Solution

How It Works

9-8. Viewing Memory Structures

Problem

Solution

How It Works

9-9. Removing In-Memory Structures

Problem

Solution

How It Works

9-10. Viewing Network Configuration Settings

Problem

Solution

How It Works

9-11. Configuring Network Settings

Problem

Solution

How It Works

9-12. Modifying System Open File Limits

Problem

Solution

How It Works

9-13. Showing Shell Limits

Problem

Solution

How It Works

9-14. Changing Shell Limits

Problem

Solution

How It Works

image Chapter 10: Automating Jobs with cron

10-1. Enabling Access to Schedule Jobs

Problem

Solution

How It Works

10-2. Editing the cron Table

Problem

Solution

How It Works

10-3. Understanding cron Table Entries

Problem

Solution

How It Works

10-4. Setting Operating System Variables

Problem

Solution

How It Works

10-5. Specifying the Execution Shell

Problem

Solution

How It Works

10-6. Redirecting cron Output

Problem

Solution

How It Works

10-7. Embedding Conditional Logic

Problem

Solution

How It Works

10-8. Troubleshooting cron

Problem

Solution

How It Works

image Chapter 11: Managing Server Software

11-1. Installing Packages

Problem

Solution #1

Solution #2

How It Works

11-2. Switching to the Oracle Unbreakable Linux Network

Problem

Solution

How It Works

11-3. Associating Linux Files with RPM Packages

Problem

Solution #1

Solution #2

How It Works

11-4. Listing the Contents of an RPM Package

Problem

Solution #1

Solution #2

How It Works

11-5. Downloading Packages

Problem

Solution

How It Works

11-6. Automating Server Builds with Oracle RDBMS Server PreInstall RPM

Problem

Solution

How It Works

11-7. Upgrading Packages

Problem

Solution #1

Solution #2

How It Works

11-8. Removing Packages

Problem

Solution #1

Solution #2

How It Works

11-9. Checking RPM Requirements to Install Oracle Database

Problem

Solution

How It Works

11-10. Performing Initial Silent Oracle Software Installation with Response Files

Problem

Solution #1

Solution #2

How It Works

11-11. Creating a Database with a Response File

Problem

Solution

How It Works

11-12. Creating a Network Configuration with a Response File

Problem

Solution

How It Works

11-13. Applying Patch Set Updates (PSUs) and Interim Patches

Problem

Solution

How It Works

11-14. Cloning an Oracle Home

Problem

Solution

How It Works

11-15. Attaching an Oracle Home

Problem

Solution

How It Works

image Chapter 12: VirtualBox for Oracle

12-1. Installing Oracle VM VirtualBox

Problem

Solution

How It Works

12-2. Setting Up VirtualBox Virtual Machine (VM)

Problem

Solution

How It Works

12-3. Starting Up a VM for the First Time

Problem

Solution

How It Works

12-4. Creating Additional Virtual Disks

Problem

Solution

How It Works

12-5. Provisioning/Sharing a Disk with Another VM

Problem

Solution

How It Works

12-6. Configuring the Virtual Network

Problem

Solution

How It Works

12-7. Leveraging/Creating Oracle VM VirtualBox Prebuilt Templates

Problem

Solution #1: Leveraging Oracle’s Prebuilt Template

Solution #2: Creating Your Own OVA Template

How It Works

12-8. Cloning a VM

Problem

Solution

How It Works

12-9. Working with Snapshots

Problem

Solution

How It Works

image Chapter 13: Optimizing Linux for Oracle Databases

13-1. Minimalizing the Linux Environment for Performance and Security

Problem

Solution

How It Works

13-2. Configuring Hugepages

Problem

Solution

How It Works

Automating Hugepages Server Configuration

Computing the Value of Huge Pages on an Existing Linux Server

Disabling Transparent Huge Pages

13-3. Enabling Jumbo Frames

Problem

Solution

How It Works

13-4. Determining and Implementing the Right I/O Scheduler

Problem

Solution

How It Works

13-5. Setting Pertinent Kernel Parameters for Oracle Databases

Problem

Solution

How It Works

13-6. Configuring NTP for Oracle

Problem

Solution

How It Works

13-7. Bonding Network Interfaces

Problem

Solution

How It Works

13-8. Enabling Network Services Cache Daemon (nscd)

Problem

Solution

How It Works

13-9. Aligning Disk Part itions Correctly

Problem

Solution

How It Works

image Chapter 14: Working Securely Across a Network

14-1. Setting Up SSH

Problem

Solution

How It Works

14-2. Generating Host Keys

Problem

Solution

How It Works

14-3. Logging On Securely

Problem

Solution

How It Works

14-4. Copying Files Securely

Problem

Solution

How It Works

14-5. Authenticating Through Public Keys

Problem

Solution

How It Works

14-6. Configuring a Promptless Logon

Problem

Solution

How It Works

image Chapter 15: Managing X Window

15-1. Configuring an X Server

Problem

Solution

How It Works

15-2. Starting an X Server

Problem

Solution

How It Works

15-3. Stopping the X Server

Problem

Solution

How It Works

15-4. Displaying an X Client on a Remote Server

Problem

Solution

How It Works

15-5. Tunneling X Over SSH

Problem

Solution

How It Works

15-6. Manipulating the Terminal Emulator for X Windows

Problem

Solution

How It Works

image Chapter 16: Managing Remote Servers with VNC

16-1. Downloading the VNC Software

Problem

Solution

How It Works

16-2. Installing the VNC Software

Problem

Solution

How It Works

16-3. Manually Starting and Stopping the VNC Server

Problem

Solution

How It Works

16-4. Automatically Starting the VNC Server on Linux

Problem

Solution

How It Works

16-5. Automatically Starting the VNC Server on Solaris

Problem

Solution

How It Works

16-6. Starting the VNC Viewer

Problem

Solution

How It Works

16-7. Securing a VNC Connection

Problem

Solution

How It Works

16-8. Accessing VNC via a Proxy Server

Problem

Solution

How It Works

16-9. Running X Applications with VNC

Problem

Solution

How It Works

16-10. Troubleshooting VNC

Problem

Solution

How It Works

image Appendix A: RAID Concepts

Understanding RAID

Defining Array, Stripe Width, Stripe Size, Chunk Size

RAID 0

RAID 1

Generating Parity

RAID 4

RAID 5

Building Hybrid (Nested) RAID Devices

RAID 0+1

RAID 1+0

RAID 5+0

Determining Disk Requirements

Capacity Planning

image Appendix B: Server Log Files

Managing Linux Log Files

Rotating Log Files

Setting Up a Custom Log Rotation

Monitoring Log Files

Managing Solaris Log Files

Viewing System Message Log Files

Rotating Solaris Log Files

Summary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset